All manner of crazy things happen

Lots of interpretations of what you see but the question is what if the correct explanation is the obvious one? Sharyl Attkisson releases video of alleged computer intrusion:

Former CBS News correspondent Sharyl Attkisson has released to Politico a video clip that shows an alleged hacker attack against her Apple computer. The video’s release comes just days before the Nov. 4 publication date of her book “Stonewalled,” which inventories her efforts to hold the Obama administration accountable, along with providing a running narrative about intrusions into her home and work computers.

The video itself shows a computer with a moving cursor erasing words from a document. In the background, a voice — purportedly Attkisson’s — says “not touching it” and “just deleting everything.” At one point, the footage shows a partial view of the computer’s keyboard, which is free of hands.

In “Stonewalled,” Attkisson provides a blow-by-blow account of this moment. It’s September 2013 and White House officials Jay Carney and Eric Schultz both are complaining to CBS News higher-ups about Attkisson’s Benghazi reporting. In an e-mail to CBS News Washington Bureau Chief Chris Isham, Carney slights a piece by Attkisson that he calls an “exclusive preview of a Darrell Issa press release,” in reference to the California Republican congressman who chairs the House oversight committee. Schultz pitches another CBS News staffer, Major Garrett, on a story that contains “exonerating material.”

Right against these e-mails, things get dicey for Attkisson and her computer. Let her tell the story:

That very night, with Schultz, Carney, and company freshly steaming over my Benghazi reporting, I’m home doing final research and crafting questions for the next day’s interview with [Thomas] Pickering. Suddenly data in my computer file begins wiping at hyperspeed before my eyes. Deleted line by line in a split second: it’s gone, gone, gone. I press the mouse pad and keyboard to try to stop it, but I have no control. The only time I’ve seen anything like this is in those movies where the protagonist desperately tries to copy crucial files faster than the antagonist can remotely wipe them.

Attkisson grabs her phone and records video of the on-screen happenings. All manner of crazy things happen, including the disabling of a drop-down menu. “Eventually, I find that all I have the ability to do is close out the file,” she writes, noting that another open file starts undergoing ghost-driven deletions. Once she unplugs the computer from FiOS WiFi, the strangeness ends. Computer experts, she writes, “agree that [the video] shows someone remotely accessing my computer. Somebody who apparently wanted me to know it.”

This entry was posted in Freedom of speech, International. Bookmark the permalink.

63 Responses to All manner of crazy things happen

  1. Blogstrop

    It’ll be the tax people after her next. The US voters are demonstrably insane if they again elect a Democrat. That country has a lot of loopy left media, as do we, but at least they have Fox News and some high profile conservative blog and radio personalities. It’s come to nothing however, for two presidential elections in a row.

  2. old44

    Or, she could have been deleting it herself using a wifi keyboard off camera to gain publicity.

  3. Paul

    ”at least they have Fox News”

    HA HA HA Thats a good one.

  4. entropy

    There are two scenarios. As old44 said, she ( or someone nearby) is just using an off camera Bluetooth keyboard and she is a nut job, or someone had remote access set up. There are any number of programs set up to allow this, but usually she would have had to give permission. So it is either a fake story or actually happened. Each could easily be true.

  5. blogstrop

    And people are dobbing themselves in to the revenue for an audit, too, I guess.
    Yes, Paul, it is a good one.

  6. entropy

    Sure, Blogstrop. I am just saying it might not be genuine. She should have had the computer forensically examined to see if there is some remote access software that shouldn’t be there. Or the no doubt work installed one for the IT support hasn’t been modified.

  7. AP

    Yeh unfortunately this isn’t proof of anything as there are a number of potential explanations, all of which have happened to me in the past.

    Stuck “delete” key, bad drivers for touchpad, book left on second wireless keyboard which was inadvertently holding keys down… etc.

    I’ve also had a work colleague who was hacked in a similar way and the perps then rang him puporting to sell a “fix”. Very scary for a bloke who is only marginally computer literate.

    The video also appears to be cropped – unless this is the default size for some brand of phone?

  8. blogstrop

    There’s more context about Atkisson, well-respected and award-winning, but prone to “making waves” in this report.
    There was a time when I would have said many of the things that have happened under this administration couldn’t happen, but there you go. I’d say her coverage of Benghazi and resignation from CBS was enough to give the book publicity without going out on a limb with this story, which was bound to give rise to “she did it herself” allegations.

  9. srr

    Live time, command override hacking, is not news, and not uncommon.

    That full time anonymous bloggers still try the, ‘mock the victims of it’, form of, ‘nothing to see here, move along’, and so many other anonymous bloggers obediently avert their eyes and walk away, well….

  10. Leigh Lowe

    She’s obviously racist.
    I mean who does she think she is, criticising the great President Niblick.

  11. Tel

    If she got hacked (by virus, trojan, or whatever) then it would be very easy for a hacker to do something like this. However, I cannot understand the incentive, other than a juvenile mischief maker, doing it for a gag.

    Deleted line by line in a split second: it’s gone, gone, gone. I press the mouse pad and keyboard to try to stop it, but I have no control. The only time I’ve seen anything like this is in those movies where the protagonist desperately tries to copy crucial files faster than the antagonist can remotely wipe them.

    The hacker can just delete the entire drive with one command, anyone who really wanted to destroy stuff would not waste time cursoring around on screen. This sort of thing is entirely theatrical effect.

  12. Chris

    The hacker can just delete the entire drive with one command, anyone who really wanted to destroy stuff would not waste time cursoring around on screen. This sort of thing is entirely theatrical effect.

    Yep, this is either fake or someone was just playing a practical joke on her. if someone wanted to actually delete her files she wouldn’t have noticed anything on the screen at all. And by the time she realised what had happened it would have been too late. This really only happens in movies and tv shows.

  13. Jon Reinertsen

    So why would someone edit a document she was working on instead of deleting the file? Also it is an Apple computer, rather hard to hack into if you have your firewall turned on. This is in short, a set up.

  14. stevo

    So obviously an infantile attention-grabbing stunt.

    A hacker would only delete from an open, on-screen document if they deliberately wanted the victim to know they were there and in control of their computer, and only if they were not really interested in deleting files, just generating fear.

    If they want to delete files, they will just delete them. Much more dramatic than a bit of showy messing about with the keyboard.

    Really, it smacks of shamateurism – the hacking is of a style you commonly see in a hollywood movie, not at all what it is like in real life.

  15. stevo

    … and “computer experts” would not agree on much based on a video of the event. They’d want to look at the contents of various log files on the computer, where there might be real less disputable evidence of what really happened (or not).

  16. Penguinite

    Couldn’t she have given someone authority to act remotely? Microsoft offer a service to assist people having problems. Sorry! I’m not convinced

  17. Or, she could have been deleting it herself using a wifi keyboard off camera to gain publicity.

    True, but only a partisan hack would believe that without believing it possible to not be fake. Cue leftard howls.

  18. stackja

    Or another version, just trust us we are the Obama Administration.

  19. Mk50 of Brisbane, Henchman to the VRWC

    A few commenters need to read up on this chick. She’s an actual investigative reporter and was forced out of employment in one of the oh-so-left US kneepad companies for wanting to apply blowtorches to political bellies irrespective of them being fascist or limp-dick republican: when what they wanted her to do was do as they all do and fellate the Preshizzle (Paco™) and his fascists. (Yeah, I know all the jokes ‘she’s the wrong sex for the Shizz (Paco™) to want fellatio from’, heard ’em all.)

    She was black-balled by Preshizzle (Paco™) Odumbugger’s pravda-apparatchiki.

    Her book is monstrously embarrassing for Preshizzle (Paco™) Odumbugger’s fascist party and for the Preshizzle (Paco™) himself,a nd even more embarrassing for the kneepad-media. And they are far, far worse than our media here. The Australian Bolshevik Collective and Socialism, Boobs and Soccer would be thought of as ravingly far-right by most US media-comrades.

    Ockham’s Razor, folks, Ockham’s Razor – this is most likely an electronic ‘Horse’s head’ left at her door. A warning from the fascist Alinskyites for her to back off. It’s too obvious to be much else.

  20. .

    We can’t trust the ALP and Greens with more power.

    Data retention is a very, very bad idea.

  21. .

    Leigh that was racist. Any other President would simply be called “Mr Cleveland”….

    Jon Reinertsen
    #1500905, posted on November 2, 2014 at 10:42 am

    So why would someone edit a document she was working on instead of deleting the file? Also it is an Apple computer, rather hard to hack into if you have your firewall turned on. This is in short, a set up.

    The first point is substantive the second is pure Apple propaganda and dross.

  22. Giffy

    I don’t trust Senator Leyonhjelm.
    The Senator is another politician I do not trust.

  23. .

    We can presume Giffy is for the wholly unecessary and problematic data retention laws.

  24. Clam Chowdah

    This sort of thing will only boost the hysteria of Dot, Sinc and others.

    Tch, tch, tch.

  25. Giffy

    “We can presume ….”

    The royal “we”, yet again.
    Habeo remedium tibi.

    Be as presumptuous as you wish.

    I don’t trust the Senator.
    And my dog wouldn’t either.

    Amazing things? A bad practical joke; making mischief.

  26. .

    Those who are hysterical insist the government is a clusterfuck and then trust them not to release data in a malicious manner, let alone as an honest mistake.

    The truly hysterical ones then declare all libertarian MPs are not to be trusted, but insist that refusing to pass Hockey’s socialist budget makes you a Green.

    I’m a realist. Some organ donor from the ATO or Office for the Status of Women will fuck this up for us all, even if we don’t see something like the abuse of information contained in the CBUS intimidation of non union members or Obama’s IRS scandal of witch hunting political enemies.

    Something like that is likely to happen. There is simply too much financial as well as political incentive to get into this data

    The upside is that government websites are so poorly run or non-funcitonal that this will act as a great artificial barrier to any mischevious or careless misadventure.

  27. .

    Giffy won’t trust David Leyonjelm (in any circumstance) but he will trust George Brandis and the next ALP government – with more power and chances to seriously err.

    We think he can’t be serious.

  28. Diogenes

    A hacker would only delete from an open, on-screen document if they deliberately wanted the victim to know they were there and in control of their computer, and only if they were not really interested in deleting files, just generating fear.

    A typical “hacker” would not do as you suggest – they try to find personal data to steal identities , passwords etc. Given the recent IRS exposures, the administration’s “dirty tricks department” (not saying it is even part of the govt ie CIA NSA) couldn’t do the “standard” IRS audit thing. How better to chill free speech/don’t mess with the Anointed One, than by showing “We know what you are doing” .

    There was an earlier report that that somebody had posted “classified” files on a reporters computer to try to get a “national security” prosecution going.

  29. Giffy

    “…. will trust George ….”

    Trust George of the limp handshake?
    Another “we” –
    Which takes me right back to my earlier belief that (.) is an uppity, very senior school principal – in the style of those hefty hospital matrons whom you see in vintage films, bustling up and down the wards, crying “we” “we”.

    You want me to be a boy?
    I won’t do that.
    And I won’t trust any politician who has been found out …… pretending.

  30. Andrew

    More crazy stuff to boost the budget deficit.</blockquote

    Let's assume 10% was wasted / stolen. Then are you really suggesting the $18bn in legit micro purchases could have been procured for under $2bn overhead?

    I once spent a month fighting for a $10 switch box, while the IT manager argued I should wait 6 months for their strategy. I just wanted to print to my secretary's laser printer. Then I bought and installed it myself. That was in the PRIVATE sector! Think the U.S. Govt is better?

  31. Greg J

    I don’t trust Senator Leyonhjelm.
    The Senator is another politician I do not trust

    Frankly, Giffy, I’m not sure I do either, and I’m a paid up member of the party.

  32. .

    Yes Giffy, lay it on thick etc – now do you think the new laws are a good idea or not?

  33. Grigory M

    Dot – I believe it has been well established (and fairly recently) that Giffy is not a “he” – but is in fact a member of the fairer sex.

  34. Mr Rusty

    Also it is an Apple computer, rather hard to hack into if you have your firewall turned on.

    Mmmmmmm…..yeeeeeaaahhh….no.

    Jennifer Lawrence, Kate Upton and Mary Elizabeth Winstead say so too.

  35. .

    I just want Giffy to join us and say “we don’t need your stinkin’ data retention laws”.

  36. .

    Mr Rusty
    #1501374, posted on November 2, 2014 at 6:29 pm

    Also it is an Apple computer, rather hard to hack into if you have your firewall turned on.

    Mmmmmmm…..yeeeeeaaahhh….no.

    Yeah. Too funny. “Duh Macs don’t get viruses'”…FMD.

  37. Clam Chowdah

    As an aside, David Leyonhjelm (since he’s been mentioned) described the fuels issue as a “cunning stunt”. I don’t mind robust language and allusions online and in the pub but I think our politicians should not be playing obvious crude word games. I also think Whitlam’s “country member” line was low class and illustrative of the generally low intellectual standards of the ALP then and now.

  38. Grigory M

    our politicians should not be playing obvious crude word games

    e

    +1 Clam Chowdah – time and place.

  39. Dan

    Also it is an Apple computer, rather hard to hack into if you have your firewall turned on.

    These hacks simply rely on the user authorising remote access. OS is not determinative.

  40. Giffy

    “………… the new laws are a good idea or not?”

    Okay. I’ll answer your question –
    first you apologise for the disgusting “pillow-biter” message you typed, and then posted to me.

    Re the abovementioned laws – you seem greatly disturbed.
    I will say this: I am not a Nervous Nell.
    I’m not all-atremble; not neurotic; nor paranoid, nor obsessive

    I’m optimistic
    yeah
    optimistic

  41. .

    Okay. I’ll answer your question –
    first you apologise for the disgusting “pillow-biter” message you typed, and then posted to me.

    WTF?!

    I don’t know the details of anyone’s mail and you are not the few people here I know the email account of.

    I suggest you take this up with Sinclair.

  42. Grigory M

    Dot – you didn’t e-mail it – you posted it in a comment. Everyone who was watching that thread saw it. You owe the lady an apology.

  43. Grigory M

    OK, Dot – I’ll go find it for you. It wasn’t very long ago.

  44. Grigory M

    Here you go, Dot – Wednesday 22 October Open Forum:

    . #1488668, posted on October 23, 2014 at 12:21 pm

    Giffy you are what we call a pillow biter.

    The rest of what you posted I won’t repeat. You owe Giffy an apology, Dot

  45. .

    ???

    What a gee up. I posted what to Giffy – nothing. Note the insane comments about supporting SSM right now.

    That is a reference to not complaining about the government interfering with your life.

    I have called a lot of other people that.

    Giffy supports big government fucking things up. I don’t know how she lives with herself.

  46. Grigory M

    Just won’t do, Dot – you know what you said and you know you need to apologise to Giffy – directly, publicly and without qualification. It’s time you did

  47. Giffy

    If (.) has posted an apology for offending me, I accept it.

    Apologies to Steve Kates – this stuff is off-topic.
    Your Amazing things:
    I think it’s mischief, but not the harmless sort.
    —————————————————-

    Thanks, Grigory M. I would never have found that message he sent.
    I see why Tintarella likes you : )
    Time to sign off – impossible to stay, when Gab declares me a sock-puppet, yet again. Yet again.
    Poor thing, I see she believes it’s “obvious”. Oh well
    Lizzie will set you straight, Gab.

  48. .

    I apologised on the open forum.

    I believe Giffy loves government power without being a beneficiary of such power. This is irrational and it will come back to haunt her and her fellow citizens one day. Obama’s IRS scandal is the case in point.

  49. .

    Thank you Giffy. That is very gracious off you.

  50. Grigory M

    I apologised on the open forum.

    More garbage, Dot. You didn’t really apologise – you did a qualified load of rubbish where you attempted to cast further aspersions on the lady, notwithstanding that you are the person who is clearly in the wrong in this instance.

    Giffy, however, has had the good grace to allow what you have said to be acceptable to her as an apology.

    I will go along with that.

  51. .

    I will go along with her grace, not your nonsense.

  52. cynical1

    Oh noes. They deleted a best seller.

    Fucking hard to edit the backup on a memory stick.

    this looks like a setup to discredit the woman as a nutcase..

  53. I think, cynical1, you are right. And it seems to be working as people here are looking at the ‘how’, and not the ‘why’.
    Find the target;
    Freeze it;
    Personalise it.

  54. Adam d

    What else did dot say? Because pillow biter surely doesn’t constitute an apology does it?

  55. .

    In short I said those who cheer on the growth of government power and taxation are like abuse victims who do not complain, however, I used rather bawdy and intemperate language.

    The government taking your rights away is more important than having a rude word said at you on a blog.

  56. Adam d

    Poor language does your argument a disservice. Those who take offence on a blog need to grow a metaphorical pair and those who take offence on their behalf should move to Iraq and ask the locals if they support homosexuality

  57. MartinG

    The video’s release comes just days before the Nov. 4 publication date of her book “Stonewalled,”

    She’s a fraud.

  58. Grigory M

    The video’s release comes just days before the Nov. 4 publication date of her book “Stonewalled,”

    She’s a fraud.

    She certainly is.

  59. Giffy

    To Adam d

    You hadn’t read the “poor language”?
    Grow a pair … putasne?
    Okay, let’s be robust:
    The message: “Giffy..you think you’re a good boy for not complaining about being f****d in the arse”

    An apology. An acceptance. The end.
    Please jam your priggish pontification, Adam d.

    And dot thinks you have offered wise words; he may think you are a wise man.
    I think you’re a piss face.

Comments are closed.